Delivering security innovation that puts Microsoft’s experience to work for you

Credit to Author: toddvanderark| Date: Mon, 24 Sep 2018 13:00:20 +0000

Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting harder. Microsoft can help. We focus on three areas: running security operations that work for you, building enterprise-class technology, and driving partnerships for a heterogeneous world. We can tip the scales in favor of the good guys and make the world a safer place.

The post Delivering security innovation that puts Microsoft’s experience to work for you appeared first on Microsoft Secure.

Read more

TIPs to Securely Deploy Industrial Control Systems

Credit to Author: Daniel Desruisseaux| Date: Tue, 18 Sep 2018 19:47:59 +0000

Industrial Control System (ICS) operators recognize the need to improve cybersecurity, but many lack the understanding on how to deploy a system in a secure manner.  Schneider Electric has authored… Read more »

The post TIPs to Securely Deploy Industrial Control Systems appeared first on Schneider Electric Blog.

Read more

Office VBA + AMSI: Parting the veil on malicious macros

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 12 Sep 2018 16:02:43 +0000

As part of our continued efforts to tackle entire classes of threats, Office 365 client applications now integrate with Antimalware Scan Interface (AMSI), enabling antivirus and other security solutions to scan macros and other scripts at runtime to check for malicious behavior. Macro-based threats have always been a prevalent entry point for malware, but we

Read more

The post Office VBA + AMSI: Parting the veil on malicious macros appeared first on Microsoft Secure.

Read more

Assessing the security of a portable router: a look inside its hardware

Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000

In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware appeared first on Malwarebytes Labs.

Read more

Small businesses targeted by highly localized Ursnif campaign

Credit to Author: Windows Defender ATP| Date: Thu, 06 Sep 2018 18:00:09 +0000

Cyber thieves are continuously looking for new ways to get people to click on a bad link, open a malicious file, or install a poisoned update in order to steal valuable data. In the past, they cast as wide a net as possible to increase the pool of potential victims. But attacks that create a

Read more

Read more

A week in security (August 20 – August 26)

Credit to Author: Malwarebytes Labs| Date: Mon, 27 Aug 2018 17:06:17 +0000

A roundup of the security news from August 20 – 26, including a look at insider threats, several breaches, and what tech giants Google and Facebook are doing about their privacy issues.

Categories:

Tags:

(Read more…)

The post A week in security (August 20 – August 26) appeared first on Malwarebytes Labs.

Read more

Protecting user identities

Credit to Author: toddvanderark| Date: Tue, 04 Sep 2018 21:20:18 +0000

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions help you protect your users and their identities.

Read more

Modbus Security – New Protocol to Improve Control System Security

Credit to Author: Daniel Desruisseaux| Date: Thu, 30 Aug 2018 13:55:46 +0000

In August of 2018, Modbus.org published the Modbus Security protocol. The use of secure protocols is a fundamental component in efforts to secure Industrial Control System (ICS) traffic. Secure protocols… Read more »

The post Modbus Security – New Protocol to Improve Control System Security appeared first on Schneider Electric Blog.

Read more